Professional Documents
Culture Documents
Mobile Phone Hacking
Mobile Phone Hacking
Demo DDMS
Anti Mobile forensic tools
• File Shredding
• File shredding is a popular form of data
destruction, where the evidence is rendered
• unrecoverable after the application of the
shredding program.
• an application designed to permanently remove
files on mobile devices. The selected files are
• destroyed by overwriting them with random
data.
• Encryption
• Cryptography is the process of hiding
information for secure communication in the
presence of third parties. LUKS Manager
offers encryption to virtual folders on
Android devices.
• The virtual folder can be dynamically
mounted, unmounted, created and deleted
as required.
• After creating and mounting a virtual
volume, the forensic tools were used to test
the detection and encryption method. Both
applications were able to detect the volume
created and the
• encrypted data.
• Steganography - is the process of hiding digital
information inside another carrier file such as
media files, document files or executable files.
Unlike plain encryption, which can be easily
detected, steganography protects both the
message and the communicating parties.
• Media files, such as images, audio and video files,
are preferred for this type of encryption because
of their large size.
• In computing, inter-process
communication (IPC) is a set of methods for
the exchange of data among
multiple threads in one or more processes.
• Processes may be running on one or more
computers connected by a network.
• IPC methods are divided into methods
for message passing, synchronization, shared
memory, and remote procedure calls (RPC).
The method of IPC used may vary based on
the bandwidth and latency of communication
between the threads, and the type of data
being communicated.
• There are several reasons for providing an
environment that allows process cooperation:
• Information sharing
• Computational speedup
• Modularity
• Convenience
• Privilege separation
Smartphone packet capture